{"id":11507,"date":"2025-11-07T16:56:43","date_gmt":"2025-11-07T21:56:43","guid":{"rendered":"https:\/\/www.carahsoft.com\/wordpress\/?p=11507"},"modified":"2026-02-09T13:13:44","modified_gmt":"2026-02-09T18:13:44","slug":"carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025","status":"publish","type":"post","link":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/","title":{"rendered":"From Compliance to Capability: Key Insights from CS5 CMMC Global Conference 2025"},"content":{"rendered":"\n<p>The CS5 CMMC Global Conference 2025, the official conference of The Cyber AB, brought together more than 1,000 senior leaders from the Department of War (DOW), the Cyber AB, Federal agencies and the broader Defense Industrial Base (DIB) in Washington, D.C. The conference served as the essential gathering for defense contractors and DIB suppliers to chart the next phase of Cybersecurity Maturity Model Certification (CMMC) implementation, cyber resilience and supply chain security. \u00a0Speakers explored key themes, including:<\/p>\n\n\n\n<ul>\n<li>CMMC\u2019s Next Phase: Turning Compliance into Capability and Defending the Digital Nation<\/li>\n\n\n\n<li>AI-Driven Compliance<\/li>\n\n\n\n<li>Driving Operational Excellence through Documentation<\/li>\n\n\n\n<li>Combat Readiness: Scaling Across the Defense Ecosystem<\/li>\n\n\n\n<li>Strengthening Supply Chain Resilience<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">CMMC\u2019s Next Phase<strong> <\/strong><\/h2>\n\n\n\n<p><strong>Turning Compliance into Capability <\/strong><strong><\/strong><\/p>\n\n\n\n<p>CMMC\u2019s next phase represents precision in action and marks a national shift from policy compliance to operational defense. The United States now views information security as a foundational element of national defense. Safeguarding Controlled Unclassified Information (CUI), whether technical information, operational intelligence or logistical data, is inseparable from mission readiness and warfighter support. The DIB now operates as the digital frontline of national security, where compliance is no longer optional but an essential layer of protection.<\/p>\n\n\n\n<p><strong>Defending the Digital Nation<\/strong><\/p>\n\n\n\n<p>Contractors demonstrate that they not only meet Federal requirements but also actively share the responsibility of defending the nation\u2019s digital infrastructure. CMMC represents both a compliance framework and a patriotic commitment to protecting critical information, ensuring that data remains secure in an era where proximity to the battlefield no longer determines risk.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">AI-Driven Compliance<\/h2>\n\n\n\n<p>Artificial Intelligence is transforming the CMMC landscape by acting as a <strong>force multiplier<\/strong> for <em>speed, accuracy<\/em> and <em>operational efficiency<\/em>. Across the Defense Industrial Base, AI-enabled tools are drafting policies, tagging evidence, detecting anomalies and summarizing documentation that once required extensive manual effort. Large language models (LLMs) can rapidly produce preliminary content that validates cybersecurity readiness and synthesizes complex data, enabling DIB contractors to prepare security readiness at scale. Speakers emphasized the need for human oversight to ensure that AI-generated output is validated and aligned with compliance integrity, as automation without governance creates new vulnerabilities. In practice, organizations should leverage AI to enhance efficiency and maintain traceable audit trails, while reserving decision-making, evidence validation and risk assessment for qualified staff.&nbsp;<\/p>\n\n\n\n<p>When implemented responsibly, AI enables a balanced model of collaboration between human expertise and machine efficiency, accelerating readiness without compromising accountability or security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Driving Operational Excellence through Documentation<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/CS5-CMMC-Global-Conference-2025-Blog_Blog-Embedded.jpg\" alt=\"\" class=\"wp-image-11509\" style=\"object-fit:cover;width:300px;height:300px\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/CS5-CMMC-Global-Conference-2025-Blog_Blog-Embedded.jpg 300w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/CS5-CMMC-Global-Conference-2025-Blog_Blog-Embedded-150x150.jpg 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n\n\n<p>Governance, Risk and Compliance (GRC) platforms serve as key accelerators by automating version controls, maintaining audit trails, centralizing repositories and linking policies directly to evidence. Updating documentation frequently ensures team alignment and simplifies compliance upkeep as levels role out and evaluations are conducted. Embedding documentation into corporate culture ensures long-term sustainability and empowers teams to focus on meaningful security efforts rather than reactive updates.<\/p>\n\n\n\n<p><strong>Best Practices:<\/strong><\/p>\n\n\n\n<ul>\n<li>Automate version controls and standardizes templates to ensure consistency<\/li>\n\n\n\n<li>Use GRC systems to consolidate documentation and eliminate silos<\/li>\n\n\n\n<li>Treat documentation as continuous validation: write it, organize it and prove it<\/li>\n\n\n\n<li>Integrate compliance reviews into routine workflows to sustain readiness and confidence<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Combat Readiness: Scaling Across the Defense Ecosystem<\/h2>\n\n\n\n<p>The official enforcement of <strong>Title 48 of the Code of Federal Regulations<\/strong> on <strong>November 10, 2025<\/strong>, will operationalize CMMC as a mandatory requirement for Federal contracts, transforming cybersecurity from a best practice into an enforceable procurement standard across the DIB.<\/p>\n\n\n\n<p>As CMMC Phase 1 begins, compliance must be achievable and affordable, particularly for small and mid-sized contractors that anchor the defense supply chain. Organizations should use this time to budget to train and develop strategies for compliance, leveraging hyperscalers and automation to accelerate readiness. Speakers emphasized that scalable readiness, supported by harmonized frameworks and the reduction of overlapping requirements, is critical to sustaining momentum toward full certification.<\/p>\n\n\n\n<p>Early preparation is essential, as a limited number of assessors may create scheduling delays once enforcement expands. Companies that act now by documenting, training and aligning their operations with Federal standards will not only meet compliance expectations but also reinforce their resilience, competitiveness and commitment to securing the nation\u2019s defense ecosystem.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Strengthening Supply Chain Resilience<\/h2>\n\n\n\n<p>High-profile cyber intrusions reaffirmed a simple truth: <strong>supply chain security is the foundation of national security.<\/strong> Every organization must know what it protects, how it protects it and how that protection is verified through certification. Compliance is no longer just a cost of doing business; it is both a competitive advantage and a national defense<strong> imperative<\/strong>. Contractors should prepare their teams to understand eligibility requirements, strengthen internal controls and treat certification as an investment in long-term success. By embedding compliance into corporate culture and operational workflows, companies not only safeguard data but also enhance brand credibility, reduce systemic risk and ensure continuity of operations across the DIB.<\/p>\n\n\n\n<p>Each contractor that fortifies its cyber posture strengthens the resilience of the entire supply chain because securing the DIB is securing the nation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Carahsoft Can Help<\/h2>\n\n\n\n<p>Whether your organization is preparing for its first CMMC assessment or advancing its cybersecurity maturity, there are continuous opportunities to strengthen readiness and collaboration across the Defense Industrial Base.<\/p>\n\n\n\n<p><strong><em>Explore CMMC Resources<\/em><\/strong><\/p>\n\n\n\n<p>Visit <a href=\"https:\/\/www.carahsoft.com\/cmmc\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Carahsoft CS5 CMMC Blog 2025 - Bottom CTA 1\">Carahsoft&#8217;s CMMC page<\/a> to access compliance guides, vendor solutions and educational content designed to support Defense Industrial Base organizations at every maturity level. From understanding capability domains to preparing for assessments, our resources help organizations make informed decisions throughout their CMMC journey.<\/p>\n\n\n\n<p><strong><em>Download our comprehensive <a href=\"https:\/\/static.carahsoft.com\/concrete\/files\/7917\/6047\/4447\/Framework_Cybersecurity_Maturity_Model_Certification.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Carahsoft CS5 CMMC Blog 2025 - Bottom CTA 2\">Cybersecurity Maturity Model Certification Framework Guide<\/a> to understand the requirements, assessment processes and best practices for achieving CMMC compliance across all maturity levels.<\/em><\/strong><\/p>\n\n\n\n<p><strong><em>Connect with CMMC Experts<\/em><\/strong><\/p>\n\n\n\n<p>Gaining CMMC compliance can be a complex and time-consuming process, but Carahsoft can guide your organization through every stage. Partnered with more than 200 cybersecurity vendors, Carahsoft connects DIB organizations with the right technologies, service providers and experts to address every maturity level and capability domain.<\/p>\n\n\n\n<p><strong><em>Contact the Carahsoft Team at (888) 662-2724 or <a href=\"mailto:CMMC@carahsoft.com\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Carahsoft CS5 CMMC Blog 2025 - Bottom CTA 3\">CMMC@carahsoft.com<\/a> to discuss your organization&#8217;s specific compliance needs and discover tailored solutions from our network of cybersecurity partners<\/em><\/strong>.<\/p>\n\n\n\n<p><strong><em>Attend Upcoming CMMC Events<\/em><\/strong><\/p>\n\n\n\n<p>Stay informed on the latest CMMC developments through Carahsoft-hosted workshops, webinars and training sessions. Through our network of partners, policy insights and educational events, Carahsoft helps organizations advance their cybersecurity maturity and meet evolving compliance requirements. <strong><em>Register to receive updates on <a href=\"https:\/\/www.carahsoft.com\/learn\/vertical\/25-cmmc#events\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Carahsoft CS5 CMMC Blog 2025 - Bottom CTA 4\">upcoming CMMC-focused events<\/a> and training opportunities.<\/em><\/strong><\/p>\n\n\n<p><head><meta name=\"url\" property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/blog\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\"><\/head><\/p>","protected":false},"excerpt":{"rendered":"<p>The CS5 CMMC Global Conference 2025, the official conference of The Cyber AB, brought together more than 1,000 senior leaders from the Department of War (DOW), the Cyber AB, Federal agencies and the broader Defense Industrial Base (DIB) in Washington, &hellip; <a href=\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":11508,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1421,1248,1590,157,1555],"tags":[605,790,545,1618,1661,611,1498],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Key Insights from CS5 CMMC Global Conference 2025 | Carahsoft<\/title>\n<meta name=\"description\" content=\"Learn more about insights from the CS5 CMMC Global Conference 2025 and the next phase of CMMC implementation, cyber resilience and supply chain security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Key Insights from CS5 CMMC Global Conference 2025 | Carahsoft\" \/>\n<meta property=\"og:description\" content=\"Learn more about insights from the CS5 CMMC Global Conference 2025 and the next phase of CMMC implementation, cyber resilience and supply chain security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"| Carahsoft\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-07T21:56:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-09T18:13:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/CS5-CMMC-Global-Conference-2025-Blog_Blog-Post-Preview.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"875\" \/>\n\t<meta property=\"og:image:height\" content=\"635\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"caduncan@carahsoft.com\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"caduncan@carahsoft.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/\"},\"author\":{\"name\":\"caduncan@carahsoft.com\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5\"},\"headline\":\"From Compliance to Capability: Key Insights from CS5 CMMC Global Conference 2025\",\"datePublished\":\"2025-11-07T21:56:43+00:00\",\"dateModified\":\"2026-02-09T18:13:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/\"},\"wordCount\":1047,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/CS5-CMMC-Global-Conference-2025-Blog_Blog-Post-Preview.jpg\",\"keywords\":[\"Artificial Intelligence\",\"CMMC\",\"Cybersecurity\",\"Defense Industrial Base\",\"Department of War\",\"Federal Government\",\"Supply Chain Management\"],\"articleSection\":[\"CMMC\",\"Department of War\",\"Events\",\"Federal Government\",\"Supply Chain Management\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/\",\"name\":\"Key Insights from CS5 CMMC Global Conference 2025 | Carahsoft\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/CS5-CMMC-Global-Conference-2025-Blog_Blog-Post-Preview.jpg\",\"datePublished\":\"2025-11-07T21:56:43+00:00\",\"dateModified\":\"2026-02-09T18:13:44+00:00\",\"description\":\"Learn more about insights from the CS5 CMMC Global Conference 2025 and the next phase of CMMC implementation, cyber resilience and supply chain security.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/#primaryimage\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/CS5-CMMC-Global-Conference-2025-Blog_Blog-Post-Preview.jpg\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/CS5-CMMC-Global-Conference-2025-Blog_Blog-Post-Preview.jpg\",\"width\":875,\"height\":635},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.carahsoft.com\/wordpress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"From Compliance to Capability: Key Insights from CS5 CMMC Global Conference 2025\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"name\":\"| Carahsoft\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\",\"name\":\"Carahsoft\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"width\":3184,\"height\":846,\"caption\":\"Carahsoft\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5\",\"name\":\"caduncan@carahsoft.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g\",\"caption\":\"caduncan@carahsoft.com\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Key Insights from CS5 CMMC Global Conference 2025 | Carahsoft","description":"Learn more about insights from the CS5 CMMC Global Conference 2025 and the next phase of CMMC implementation, cyber resilience and supply chain security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/","og_locale":"en_US","og_type":"article","og_title":"Key Insights from CS5 CMMC Global Conference 2025 | Carahsoft","og_description":"Learn more about insights from the CS5 CMMC Global Conference 2025 and the next phase of CMMC implementation, cyber resilience and supply chain security.","og_url":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/","og_site_name":"| Carahsoft","article_published_time":"2025-11-07T21:56:43+00:00","article_modified_time":"2026-02-09T18:13:44+00:00","og_image":[{"width":875,"height":635,"url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/CS5-CMMC-Global-Conference-2025-Blog_Blog-Post-Preview.jpg","type":"image\/jpeg"}],"author":"caduncan@carahsoft.com","twitter_misc":{"Written by":"caduncan@carahsoft.com","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/#article","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/"},"author":{"name":"caduncan@carahsoft.com","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5"},"headline":"From Compliance to Capability: Key Insights from CS5 CMMC Global Conference 2025","datePublished":"2025-11-07T21:56:43+00:00","dateModified":"2026-02-09T18:13:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/"},"wordCount":1047,"commentCount":0,"publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/CS5-CMMC-Global-Conference-2025-Blog_Blog-Post-Preview.jpg","keywords":["Artificial Intelligence","CMMC","Cybersecurity","Defense Industrial Base","Department of War","Federal Government","Supply Chain Management"],"articleSection":["CMMC","Department of War","Events","Federal Government","Supply Chain Management"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/","url":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/","name":"Key Insights from CS5 CMMC Global Conference 2025 | Carahsoft","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/#primaryimage"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/CS5-CMMC-Global-Conference-2025-Blog_Blog-Post-Preview.jpg","datePublished":"2025-11-07T21:56:43+00:00","dateModified":"2026-02-09T18:13:44+00:00","description":"Learn more about insights from the CS5 CMMC Global Conference 2025 and the next phase of CMMC implementation, cyber resilience and supply chain security.","breadcrumb":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/#primaryimage","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/CS5-CMMC-Global-Conference-2025-Blog_Blog-Post-Preview.jpg","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/CS5-CMMC-Global-Conference-2025-Blog_Blog-Post-Preview.jpg","width":875,"height":635},{"@type":"BreadcrumbList","@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-key-insights-cs5-cmmc-global-conference-blog-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.carahsoft.com\/wordpress\/"},{"@type":"ListItem","position":2,"name":"From Compliance to Capability: Key Insights from CS5 CMMC Global Conference 2025"}]},{"@type":"WebSite","@id":"https:\/\/www.carahsoft.com\/wordpress\/#website","url":"https:\/\/www.carahsoft.com\/wordpress\/","name":"| Carahsoft","description":"","publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization","name":"Carahsoft","url":"https:\/\/www.carahsoft.com\/wordpress\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","width":3184,"height":846,"caption":"Carahsoft"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5","name":"caduncan@carahsoft.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g","caption":"caduncan@carahsoft.com"}}]}},"_links":{"self":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/11507"}],"collection":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/comments?post=11507"}],"version-history":[{"count":2,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/11507\/revisions"}],"predecessor-version":[{"id":11511,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/11507\/revisions\/11511"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media\/11508"}],"wp:attachment":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media?parent=11507"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/categories?post=11507"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/tags?post=11507"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}